cover
Contact Name
Brian Rakhmat Aji
Contact Email
brianetlab@gmail.com
Phone
-
Journal Mail Official
ijid@uin-suka.ac.id
Editorial Address
-
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
IJID (International Journal on Informatics for Development)
ISSN : 22527834     EISSN : 25497448     DOI : -
Core Subject : Science,
One important point in the accreditation of higher education study programs is the availability of a journal that holds the results of research of many investigators. Since the year 2012, Informatics Department has English language. Journal called IJID International Journal on Informatics for Development. IJID Issues accommodate a variety of issues, the latest from the world of science and technology. One of the requirements of a quality journal if the journal is said to focus on one area of science and sustainability of IJID. We accept the scientific literature from the readers. And hopefully these journals can be useful for the development of IT in the world. Informatics Department Faculty of Science and Technology State Islamic University Sunan Kalijaga.
Arjuna Subject : -
Articles 234 Documents
The Impact of Algorithms on Decision-Making in Daily Life: A Polling Study of Technology Users Dwi Yuniarto; Akbar, Yopi Hidayatul; Abd. Rahman, Aedah; Herdiana, Dody
IJID (International Journal on Informatics for Development) Vol. 14 No. 1 (2025): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Algorithms have become an integral part of everyday life, particularly in entertainment, shopping, and navigation. This study examines how algorithms influence individual decision-making. Data were collected through an online poll involving 200 respondents, selected using a statistical sampling method. The results indicate that 55% of respondents perceive algorithms as having a significant influence on their decisions, while 28% report a moderate impact. A confidence interval analysis (95%) has been included to ensure statistical accuracy. The study highlights the importance of digital literacy in mitigating algorithmic bias and suggests future research on how socio-cultural factors shape algorithmic perceptions. This research contributes to understanding the extent of algorithmic influence on daily decision-making and raises user awareness of technology’s impact. The implications include the importance of digital literacy to mitigate dependency and bias in algorithm usage and the potential to develop more transparent and ethical algorithmic systems. Future research could explore the relationship between users' awareness of algorithms and their behaviors in various contexts and evaluate ways to enhance public understanding of how algorithms function in the evolving digital ecosystem.
Implementation and Performance Analysis of PVD Method in Concealing Encrypted Data on Images Hanif, Ardhan; Astuti, Nur Rochmah Dyah Puji; Aribowo, Eko
IJID (International Journal on Informatics for Development) Vol. 14 No. 1 (2025): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This research aims to secure text data by combining steganography and cryptography. The Pixel Value Differencing (PVD) method allows for higher data insertion capacity with minimal distortion, thereby increasing resistance to steganalysis. However, the PVD steganography method is vulnerable to variation in image areas and to the accuracy of Pixel Difference Histogram (PDH) analysis. In addition, this method is susceptible to statistical tools such as the chi-square and RS, which can be used to analyze the distribution of pixel value differences, allowing data to be detected. To address the limitations of the PVD method, we employed a cryptographic technique called XOR-VLSB, which combines XOR as the primary encryption method, Vigenère Cipher for key generation, and Least Significant Bit (LSB) for key embedding. The results showed that the fully encrypted data could be recovered and had good image quality, as indicated by the metric results, which included a low MSE value, a PSNR above 35 dB, and an SSIM value close to 1. In this study, the process of encrypting text data still uses a simple encryption algorithm, namely XOR. Future research may involve replacing cryptographic algorithms with AES, which offers stronger protection and better resistance to advanced security threats.
Towards Fair and Efficient Timetabling: A Genetic Algorithm Model Integrating Lecturer Day-Off Requests Khaeroni, Khaeroni; Muqdamien, Birru; Hestiningtyas, Ajeng
IJID (International Journal on Informatics for Development) Vol. 14 No. 1 (2025): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study tackles the complex challenge of lecture timetabling by incorporating lecturer day-off preferences, a crucial constraint often neglected in traditional scheduling methods. Given the NP-hard nature of the problem and the need for scalable solutions, a Genetic Algorithm (GA) was employed with a population size of 10, a crossover probability of 0.70, a mutation probability of 0.20, and a maximum generation of 10000. The proposed GA-based method, implemented using PHP and MySQL, is applied to a real-world scenario involving 25 courses, 22 lecturers, and six classrooms over a 5-day weekly schedule at the Faculty of Education and Teacher Training for the Even Semester of the 2023/2024 Academic Year. Experimental results, validated through the Mann-Whitney test, show that incorporating lecturer preferences enhances scheduling flexibility without significantly increasing computational time. Comparative analysis with Simulated Annealing and Tabu Search demonstrates the competitive performance of the GA-based method in optimizing lecture schedules. This study provides a practical solution for educational institutions seeking to improve their timetabling processes.
Price Forecasting of Chili Variant Commodities Using Radial Basis Function Neural Network Ramadhan, Ade Umar; Siregar, Maria Ulfah; Nafisah, Syifaun; Anshari, Muhammad; Ndungi, Rebeccah; Mulyawan, Rizki; Nurochman, Nurochman; Gunawan, Eko Hadi
IJID (International Journal on Informatics for Development) Vol. 12 No. 1 (2023): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2023.5129

Abstract

This study addresses the challenge of price instability in chili markets, which can lead to economic losses and inflation. To mitigate this issue, we propose a machine learning model using Radial Basis Function Neural Networks (RBFNN) to predict prices of various chili variants. Our quantitative approach involves a comprehensive data preparation process, including preprocessing and normalization of time series data collected from 2018 to 2022. The RBFNN model is constructed with K-Means clustering for optimal hidden layer configurations and evaluated using Mean Absolute Percentage Error (MAPE) and Root Mean Square Error (RMSE). The results demonstrate promising accuracy, with MAPE error rates below 20% and relatively low RMSE values for large red chili (10.37%, 4484) and curly red chili (14.77%, 5590). Our findings indicate the potential for creating a reliable forecast model for predicting chili prices over 7 days, enabling better supply and demand management. The study's results also suggest that increased training data enhances forecasting accuracy. This research contributes to the development of effective price forecasting models, providing valuable insights for policymakers and stakeholders in the chili industry.
IT Infrastructure Assessment using the COBIT 2019 Framework Rifa'i, Aulia Faqih; Sumarsono; Muhammad Fauzan Al Baihaqi; Yazid Azfa Yasa
IJID (International Journal on Informatics for Development) Vol. 12 No. 2 (2023): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2023.5152

Abstract

The Admission Office is responsible for student enrollment, and since 2013, the admission process at UIN Sunan Kalijaga has been supported by information technology. To assess the current state of the IT infrastructure in this university, the COBIT 2019 Framework was used. This study identifies five key domains in need of improvement: APO12 (manage risk), which focuses on managing IT-related risks within an organization, BAI10 (manage configuration), to ensure that IT services are delivered efficiently and effectively, DSS02 (manage service requests & incidents), involves the process of providing quick and efficient responses to user requests and handling various incidents, DSS03 (manage problems), to provide timely and effective support to consumers, ensuring their issues are addressed, their needs are met, and DSS04 (manage continuity), to ensure that the organization can respond effectively to incidents and disruptions, minimizing downtime and maintaining business continuity. The results showed that the capability levels for these domains in UIN Sunan Kalijaga were at Level 1, while the target was Level 4, leading to a capability gap of 3. The gap indicates that considerable effort is required to improve and achieve the desired level of maturity, and this research proposes some recommendations to improve the IT infrastructure.
LDA Topic Modeling Analysis of Public Discourse on Indonesia’s Free Nutritious Meals Program (MBG) Cici Suhaeni; Mualifah, Laily Nissa Atul; Wijayanto, Hari
IJID (International Journal on Informatics for Development) Vol. 14 No. 1 (2025): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study investigates public discourse on Indonesia's Free Nutritious Meals (Makan Bergizi Gratis/MBG) program through Latent Dirichlet Allocation (LDA) topic modeling of YouTube comments. Filling a research gap on online public opinion regarding the MBG policy, this study identifies dominant themes and discursive patterns in public perception. A three-topic model, validated through coherence score evaluation and pyLDAvis visualization, reveals key topics: concerns over food prices and distribution, perceived benefits for children and society, and emotionally and politically driven reactions. The findings provide valuable insights into public opinion, while also highlighting challenges in processing Indonesian-language text, such as informal language and noisy data. This study contributes to understanding public perceptions of social policies in digital environments and recommends future research directions, including improved text preprocessing and alternative topic modeling approaches. By shedding light on online public discourse, this research informs policymakers and stakeholders about the effectiveness and potential areas for improvement in the MBG program.
A Hybrid Approach of Pearson Correlation and PCA in Feature Selection for Opinion Mining Tri Romadloni, Nova; Kurniawan, Wakhid; Ariyadi, Muhammad Yusuf; Efendi, Burhan
IJID (International Journal on Informatics for Development) 2025
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study proposes a hybrid feature selection approach that combines Pearson Correlation and Principal Component Analysis (PCA) to improve classification performance in opinion mining tasks. The rapid growth of e-commerce on social media platforms, such as TikTok, has generated a significant volume of user-generated reviews, which are valuable sources of consumer sentiment. However, the high dimensionality of textual data poses challenges in achieving accurate sentiment classification. To address this issue, the proposed method first applies Pearson Correlation to remove irrelevant features with weak correlation to sentiment labels, followed by PCA to reduce dimensionality. The dataset consists of user reviews from the TikTok Seller platform. Experiments using SVM, Naive Bayes, and Random Forest show that the hybrid approach achieves the highest accuracy of 86.2% (SVM and RF), improving over PCA-only by +0.9% and recovering 13.8% accuracy loss for Naive Bayes (from 72.0% to 83.1%). The results demonstrate that integrating correlation- and projection-based methods yields a more compact and effective feature set. This approach is especially suited for opinion mining in noisy, high-dimensional e-commerce data.
Malware in Computer Systems: Problems and Solutions Hama Saeed, Mariwan Ahmed
IJID (International Journal on Informatics for Development) Vol. 9 No. 1 (2020): IJID June
Publisher : Faculty of Science and Technology, Universitas Islam Negeri (UIN) Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2020.09101

Abstract

Malware is a harmful programme, which infects computer systems, deletes data files and steals valuable information. Malware can attack personal and organization computer systems. In this paper, the most recent and dangerous types of malware, including CovidLock Ransomware, have been analysed and the most suitable countermeasures of malware have been provided. The purpose of this paper is to suggest manually removing malware through a range of tools. It investigates whether the University of Halabja employees are protected against malware or not and it hypothesizes that the university of Halabja employees are not protected in a great level against malware attacks. A questionnaire has been conducted and analysed. The results of the questionnaire confirmed that the university of Halabja employees are not crucially protected. Therefore, it works to propose a sufficient way to make the whole organization protected. This research can be extended to include public and private universities across Kurdistan region in order to identify the most secure university in this region against malware attacks.
Evaluation of the Maturity Level of Information Technology Security Systems Using KAMI Index Version 4.2 (Case Study: Islamic Boarding Schools in Yogyakarta Special Region Province) Arromdoni, Bad’ul Hilmi; Nuruzzaman, Muhammad Taufiq; 'Uyun, Shofwatul; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol. 12 No. 1 (2023): IJID June
Publisher : Faculty of Science and Technology, Universitas Islam Negeri (UIN) Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2023.3987

Abstract

The development of information technology worldwide has changed very rapidly. There has been a data theft on the information system belonging to one of the most prominent Islamic Boarding Schools in the Yogyakarta area. Thus, special attention is needed to evaluate information technology security using the Information Security Index version 4.2. The research methods include extracting information, literature study, data collection, data validation, data analysis, and recommendations. The evaluation results are at the basic framework fulfilment level with a value of 343; the electronic system category has a low status with a value of 15 and 5 improvements; the governance category,  the risk management category,  the framework category,  the asset management category, and the information security technology category, have a maturity level II status with 12, five, eight, four, and eight recommendations respectively, while the supplement category for third party security areas with a value of 60%, securing cloud infrastructure services 56% and protecting personal data 61% with 14 recommendations.
Analysis of Factors Affecting the Students’ Acceptance Level of E-Commerce Applications in Yogyakarta Using Modified UTAUT 2 Candra, Dori Gusti Alex; Nuruzzaman, Muhammad Taufiq; 'Uyun, Shofwatul; Sugiantoro, Bambang; Pratiwi, Millati
IJID (International Journal on Informatics for Development) Vol. 12 No. 1 (2023): IJID June
Publisher : Faculty of Science and Technology, Universitas Islam Negeri (UIN) Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2023.3990

Abstract

Yogyakarta is listed as the region with the highest number of residents engaging in e-commerce transactions. A total of 10.2% of the population are active e-commerce sellers, while 16.7% belong to the buyer category. Research by IDN Times showed that e-commerce application users have been dominated by students, with a percentage of 44.2%.  The purpose of this study is to analyze the factors that influence students’ level of acceptance of e-commerce applications in Yogyakarta using the modified UTAUT 2. This is quantitative research with multiple linear regression models using SPSS software version 25 with a sample size of 303 people. Data analysis in this study was conducted in a few steps, including descriptive analysis, validity test, reliability test, classical assumption test and hypothesis testing. The results of this study indicate that the student’s level of acceptance of e-commerce applications is within good criteria. The variables that have a positive effect on the behaviour intention (BI) are performance expectancy (PE), effort expectancy (EE), social influence (SI), facilitating conditions (FC), hedonic motivation (HM), habit (HB), price value (PV), perceived risk (PR), perceived security (PS), and trust (TR) are variables that negatively affect the variable behaviour intention (BI). All independent variables affect the dependent variable or behaviour intention (BI) with a total of 63.3% and the difference with a total of 36.7% is caused by other factors not examined by the researcher.

Filter by Year

2012 2026


Filter By Issues
All Issue 2026 Vol. 14 No. 2 (2025): IJID December Vol. 14 No. 1 (2025): IJID June 2025 Vol. 13 No. 2 (2024): IJID December Vol. 13 No. 1 (2024): IJID June Vol. 12 No. 2 (2023): IJID December Vol. 12 No. 1 (2023): IJID June Vol. 11 No. 2 (2022): IJID December Vol. 11 No. 1 (2022): IJID June Vol. 10 No. 2 (2021): IJID December Vol. 10 No. 1 (2021): IJID June Vol. 9 No. 2 (2020): IJID December Vol. 9 No. 1 (2020): IJID June Vol. 8 No. 2 (2019): IJID December Vol. 8 No. 1 (2019): IJID June Vol 7, No 2 (2018): IJID December Vol 7, No 2 (2018): IJID December Vol. 7 No. 2 (2018): IJID December Vol 7, No 1 (2018): IJID June Vol. 7 No. 1 (2018): IJID June Vol 7, No 1 (2018): IJID June Vol 6, No 2 (2017): IJID December Vol. 6 No. 2 (2017): IJID December Vol 6, No 2 (2017): IJID December Vol 6, No 1 (2017): IJID June Vol 6, No 1 (2017): IJID June Vol. 6 No. 1 (2017): IJID June Vol. 5 No. 2 (2016): IJID December Vol 5, No 2 (2016): IJID December Vol 5, No 1 (2016): IJID May Vol. 5 No. 1 (2016): IJID May Vol. 4 No. 2 (2015): IJID December Vol 4, No 2 (2015): IJID December Vol 4, No 1 (2015): IJID May Vol. 4 No. 1 (2015): IJID May Vol 3, No 2 (2014): IJID December Vol. 3 No. 2 (2014): IJID December Vol 3, No 1 (2014): IJID May Vol. 3 No. 1 (2014): IJID May Vol 2, No 2 (2013): IJID December Vol. 2 No. 2 (2013): IJID December Vol. 2 No. 1 (2013): IJID May Vol 2, No 1 (2013): IJID May Vol 1, No 2 (2012): IJID December Vol. 1 No. 2 (2012): IJID December Vol 1, No 2 (2012): IJID December Vol. 1 No. 1 (2012): IJID May Vol 1, No 1 (2012): IJID May Vol 1, No 1 (2012): IJID May More Issue